Hi Everyone, I'm new on the block and I was searching for an answer for a .ADP Project.
As you all know .ADP is Access Front-end and SQL Server Back-end.
I have to manage a secured .ADP application.
This application is in use as a database for customers, planning of mechanics and making invoices.
The application is secured which means that the sidebar is not visible and users cannot make the sidebar visible.
In this way no user can enter tables or queries in this application. As admin can I enter tables and queries from the front-end.
All users are in a usergroup with only rights to update fields within the application and use the forms.
Now I discovered that one user made a copy of the application. All rights have fallen off and she can see, enter and build queries and/ or tables in this copy. When she make a query this will end up on SQL Server.
This causes a lot of risks and I want to prevent this. One thing I can't find is how to set rights in order to prevent copying the application or setting rights that queries made in the copy can't reach SQL Server.
If someone has another way of preventing this kind of risks? Feel free to enlighten me.
Kind regards, Aks
As you all know .ADP is Access Front-end and SQL Server Back-end.
I have to manage a secured .ADP application.
This application is in use as a database for customers, planning of mechanics and making invoices.
The application is secured which means that the sidebar is not visible and users cannot make the sidebar visible.
In this way no user can enter tables or queries in this application. As admin can I enter tables and queries from the front-end.
All users are in a usergroup with only rights to update fields within the application and use the forms.
Now I discovered that one user made a copy of the application. All rights have fallen off and she can see, enter and build queries and/ or tables in this copy. When she make a query this will end up on SQL Server.
This causes a lot of risks and I want to prevent this. One thing I can't find is how to set rights in order to prevent copying the application or setting rights that queries made in the copy can't reach SQL Server.
If someone has another way of preventing this kind of risks? Feel free to enlighten me.
Kind regards, Aks